Archive for ‘Misc’

31/01/2016

Time to Trade-In your Clunky Disk to 100% Flash Storage.

        

  
    

  

30/01/2016

 الأمن الإلكتروني يتصدر – 90% من الشركات الكبيرة حول العالم تتأثر بالقرصنة 

  

الرؤية ـ دبي

دعا مختصون الشركات إلى وضع الأمن الإلكتروني في صدارة أولوياتها، بعد أن باتت الهجمات الإلكترونية أكثر تعقيداً، وتؤثر في نحو 90 في المئة من الشركات الكبيرة حول العالم.

وأفاد متحدثون شاركوا في جلسة نقاشية نظمتها في دولة الإمارات العربية المتحدة كلية تمويل الشركات التابعة لمعهد المحاسبين القانونيين في إنجلترا وويلز بأن الشركات الأكثر فاعلية في حماية أصولها هي تلك التي تستقصي باستمرار عن التهديدات الإلكترونية الجديدة التي تظهر في قطاعاتها، كما أنها تبادر بالتحرّي عن الاختراقات والانتهاكات، وتعمل على مراجعة الخطط الشاملة لإدارة المخاطر بانتظام.

واجتمع أعضاء وضيوف معهد المحاسبين القانونيين ICAEW في فندق جميرا أبراج الإمارات في دبي أخيراً لمناقشة مخاطر الهجمات الإلكترونية على الشركات.

وألقى عمدة مدينة لندن عضو المجلس البلدي اللورد مونتيفانز الكلمة الرئيسة للجلسة، وأوضح أن العصر الرقمي الذي جعل العالم أكثر قرباً في مجالات التجارة والابتكار والمساءلة، جلب معه أيضاً تهديدات إلكترونية جديدة وخطرة ـ وهي تهديدات خفية، وغير ملموسة، بل وغير قابلة للقياس على نحو كبير.

وأضاف ليس للهجمات الإلكترونية حدود تقف عندها، وهي تكبّد الشركات 400 مليار جنيه إسترليني كل سنة، ولكي نتمكّن من مواجهة هذه الهجمات العاتية، لا بد من حشد طموح عالمي في مجال الأمن الإلكتروني، وأن تتكاتف جميع الأطراف على الصعيد الدولي.

  

واتفق المتحدثون على أنه لا يوجد حل سهل للاستجابة إلى الهجمات الإلكترونية، إذ أصبحت أكثر تركيزاً وذكاء، وعلى نطاق عالمي أوسع.

من جانبه، أوضح المحاسب القانوني المعتمد والمدير الإقليمي لمعهد المحاسبين القانونيين في منطقة الشرق الأوسط وأفريقيا وجنوب آسيا مايكل آرمسترونغ أن مكافحة الجريمة الإلكترونية أنشأت سوقاً للمختصين في مجال الأمن الإلكتروني، إذ من المتوقع أن ينمو هذا السوق من 75 مليار دولار في 2015 إلى 170 مليار دولار بحلول عام 2020.

وأكد أن مجرمو الإنترنت أصبحوا أكثر دهاء وجرأة وتعنـتاً من أي وقت مضى، ومن هنا تبرز أهمية فهم المخاطر الخاصة بك من أجل حماية أعمالك.

وتابع أنه ينبغي للشركات أن تحدد الأصول التي تحتاج إلى حماية من الهجمات الإلكترونية، وتدرك أيضاً المخاطر العديدة التي قد تعصف بأعمالها.

وفي ما يتعلق بعمليات الاندماج والاستحواذ، دعا المشاركون في الجلسة النقاشية المستشارين لجعل خطابات التواصل في ما بينهم بسيطة بقدر الإمكان، وأيضاً تقليل عدد الأشخاص المعنيين في كل صفقة إلى الحد الأدنى.

واقترحوا أيضاً حماية هذه الخطابات والأجهزة المستخدمة، وإجراء تقييم للأمن الإلكتروني مع كل صفقة للاندماج والاستحواذ.

وناقش المتحدثون الفوائد التي تتحقق من محاكاة الهجمات باعتبارها جزءاً من استراتيجية الأمن الإلكتروني للشركة.

  

29/01/2016

VMware is cutting about 800 jobs as it transitions from its traditional products to newer, emerging technologies.

  
The company expects 2016 will be a key transition year as “we expect the effect of our new products to outweigh the decline in our compute products,” CEO Pat Gelsinger said in an earnings conference call Tuesday.

The company has been facing challenges in its software business as its customers are increasingly using public cloud providers like Amazon Web Services and Microsoft Azure.

“Public cloud providers do provide VMware, but for many of the newer, cloud workloads, many are opting for containers or even OpenStack which doesn’t require what’s considered expensive VMware licenses,” wrote Patrick Moorhead, president and principal analyst at Moor Insights & Strategy, in an email.
VMware reported that its total revenue under generally accepted accounting principles (GAAP) for 2015 was $6.57 billion, an increase of 9 percent from 2014, or up 12 percent year-over-year on a constant currency basis. The company forecast that 2016 revenue will be up to $6.935 billion, an annual rise of up to 4 percent from 2015.
The guidance was influenced by concern about business from weakening economies like Russia, Brazil and China.
Gelsinger said during the conference call that the company recognizes that its blockbuster compute products are reaching maturity, and will play a decreasing role in the business. 

But 

The company expects newer emerging products will pick up the slack:
One of the company’s new focus areas is on extending customers’ private cloud workloads into the public cloud via vCloud Air Network and vCloud Air. 

“For VMware to get back on track, they need to accelerate their hybrid cloud offerings into the enterprise to stem the flow of customers into the public cloud,” Moorhead said.
Some of the company’s newer products are seeing strong growth. In 2015, 

NSX, a network virtualization and security platform for the software-defined data center, grew over 100 percent year-over-year, bringing the total annual bookings run-rate to over $600 million,

 while in the fourth quarter of 2015, its Virtual SAN business grew nearly 200 percent year-over-year, with a total annual bookings run-rate of over $100 million.

26/01/2016

تراجع إيرادات التغريد تويتر – بلومبرغ جريدة الرؤية  

  

منيت جهود شركة تويتر صاحبة أشهر موقع للتواصل الاجتماعي في العالم للخروج من أزمتها بنكسة جديدة أمس، بعد رحيل أربعة من كبار مديريها، في وقت تكافح فيه الشركة من أجل تحفيز النمو، وتقلص أعداد المغردين وتطوير منتجات تلبي التغيير في احتياجاتهم.

وشملت قائمة المديرين الراحلين عن الشركة التي فقدت أسهمها 55 في المئة من قيمتها في 12 شهراً كلاً من مدير تطوير المنتجات كيفين وويل، ومدير الشؤون الهندسية أليكس روتر ومدير الموارد البشرية بريان ساشبير ومديرة وسائل الإعلام كاتي جاكوبز.

ويعكس تغيير خامس مدير للمنتجات في الشركة في أقل من خمس سنوات فشل الشركة في تطوير موقعها وقائمة منتجاتها لتلبي الاحتياجات المتغيرة للمستخدمين.

وتأتي هذه التطورات في وقت يسعى فيه المؤسس المشارك للشركة جاك دورس الذي تولى منصب رئيس مجلس الإدارة في العام الماضي لتنفيذ سلسلة من الإصلاحات تستهدف تغيير وتحسين منتجات الشركة وضمان نمو الإيرادات خصوصاً من الإعلانات.

ويبدي المستثمرون خيبة أمل متزايدة منذ طرح أسهم الشركة في اكتتاب عام في عام 2013، بسبب بطء نمو المبيعات وأعداد المستخدمين.

وفقد سهم الشركة 1.7 في المئة من قيمته في بورصة نيويورك أمس ليهبط إلى 19.92 دولار للسهم، وهي أكبر نسبة انخفاض، فيما بلغت نسبة الانخفاض التراكمية في عام 2015 نحو 35 في المئة.

وأكد دورس في وقت سابق أن الشركة تبحث عن وسائل جديدة لعرض النصوص بما في ذلك السماح للمغردين بكتابة تغريدات أطول.

وأشار دورس إلى أن المغردين يضعون تغريدات أطول بالفعل عبر التقاط صور لتغريداتهم بدلات من كتابتها.

واستبعد دورس أن تصبح التغريدات طويلة، مؤكداً أنه من الضروري أن تبقى التغريدات قصيرة ومركزة حتى لا تفقد قوتها وتأثيرها.

ويتوقع مطلعون على بواطن الأمور أن تزيد الشركة عدد الحروف المسموح بها في كتابة التغريدة إلى عشرة آلاف حرف، وهو ما يزيد كثيراً على الحد الأقصى لعدد حروف التغريدة المسموح به حالياً وهو 140 حرفاً.

ويذكر أن متوسط الإيرادات السنوية لموقع تويتر الذي أطلق في 21 مارس عام 2006 يصل إلى ملياري دولار، فيما تقدر القيمة السوقية للشركة بنحو 27 مليار دولار.

ويستخدم الموقع نحو 288 مليون مستخدم نشط شهرياً عبر الهاتف الذكي.

ووصل عدد التغريدات التي بثت عبر الموقع منذ إطلاقه وحتى نهاية عام 2014 نحو 300 مليار تغريدة.

ويقدم الموقع لمستخدميه خدمة التدوين المصغر التي تسمح بإرسال تغريدات عن حالتهم وأحداث حياتهم وإبداء آرائهم بحد أقصى في 140 حرفاً للرسالة الواحدة، عن طريق موقع تويتر مباشرة أو عن طريق إرسال رسالة نصية قصيرة أو برامج المحادثة الفورية. وتظهر التحديثات في صفحة المستخدم.

ويمكن للأصدقاء قراءة التغريدات مباشرة من صفحتهم الرئيسة أو زيارة ملف المستخدم الشخصي، ويمكن استقبال الردود والتحديثات عن طريق البريد الإلكتروني، وعن طريق الرسائل النصية القصيرة باستخدام أربعة أرقام خدمية تعمل في الولايات المتحدة وكندا والهند، إضافة إلى الرقم الدولي، والذي يمكن لجميع المستخدمين حول العالم الإرسال إليه في المملكة المتحدة.

16/01/2016

Deceptions Kill Chain Phase RWDEICA

Reconnaissance

The first stage of most attacks is the reconnaissance or recon phase. At this stage, a good strategy for deflecting the attacker is to lie to the attacker. This confuses the attacker and makes it difficult to identify potential services, applications, data or infrastructure components for the attacker to exploit.

Weaponization

At the weaponization stage, misdirecting the attacker through deceitful application responses or emulated services can delay the attacker further. It also delays the attacker’s tool selection or misdirect the attacks toward services that are not actually being used. A common tool to detect maliciousness during the weaponization phase is a network sandbox. These tools are designed to lie to malware, providing a deceptive environment to execute in and behaviorally assesses the malware for maliciousness. These tools could be extended as a blocking mechanism or to run malware for longer periods of time and invoke other deceptions, such as lie about the operating system that’s running or other system or application details. Additionally, weaponization has a lot to do with the attacker’s or its malicious code’s exploit selection. Just one example is tricking drive-by download scripts into believing you have Windows XP, when you are running Windows 7, which effectively thwarts exploit selection.

Deliver

At the deliver phase, a simple example is using other subterfuge, such as a diversion technique, to send unknown, suspicious or known malicious binaries that enter an organization’s environment into a deception zone (like a network sandbox), where it executes in a virtual environment on a real system that looks like it’s being used by a real user.

Exploit

During the exploit phase, deceptions can exist at any point in the deception stack to trick or disrupt exploitation from actually occurring, depending on the target of the exploit attack itself. For example, if we have declared that a particular traffic pattern looks malicious, we could automatically use network address translation or other transport layer protocols, and redirect suspicious traffic to a deception decoy environment, rather than the protected system or application. There are a variety of deception techniques that can be used during this phase to disrupt exploitation, but responses must be crafted according to the types of malware and attacker behavior. At the network layer, technology providers selling intrusion prevention systems have an opportunity to disrupt exploitation by providing deceptive responses and faking the outcome of a successful exploit, or shunting traffic into the deception decoy environment.

Install

At the installation phase, often on the endpoint itself, it is possible to disrupt malware itself by deceiving the malware into believing it is running in a virtual environment, or making the malware believe it has written files that it hasn’t. We know that many malware forms will stop functioning because they detect virtualization, or when they believe their execution has been successful. We can take advantage of this trust, and thus, interrupt the installation phase.

Command

During the command phase, most common malware uses command-and-control to receive commands to execute and provide the remote agent malware instructions to download other payloads or for other remote control purposes. At this stage, attackers commonly manually interact with a specific agent to gather intelligence, exfiltrate data or move laterally within the network. The most common approach of using deception at this stage is to redirect command-and-control traffic to socket servers (hosts with open TCP sockets) to understand the communication protocol used by the botnet. It is also possible to take down botnets by issuing commands back to the agent technology, and deceiving the agent itself. This approach is commonly used by federal investigators to take down botnets, but can also provide critical telemetry to enterprises, as well as disrupt attacks in a similar manner using automation and deceit, thus, disrupting the attack.

Act

During the act phase, an attacker is exploring the environment in which the malware is contained. This is the most common phase in which lateral movement, network scanning, host probing, credential gathering and other activities occur. Endpoint agent technology, or even network-based solutions, can intercept and deceive at this stage. For example, deception techniques can be used to make attackers believe they have received valid credentials or that they’ve explored real endpoint systems and are seeing real sensitive data, leading us to enhance the detection of their actions. Using the attackers’ trust against them, we can increase detection and delay their efforts, causing them more financial harm. For example, if we provide an attacker with faked credentials, it may take a week for the attacker to crack a credential that is actually useless within the enterprise environment (that is, the credential has no real privileges). Additionally, the attacker may attempt to use that cracked credential within the environment, increasing the likelihood of detection.

  
Sent from my iPadmc

10/01/2016

IT careers: How long should you stay in your job?

Over the past eight years, Michelle Ufford has had five different jobs at Web hosting company GoDaddy, including her current role as engineering manager. There once was a time when Ufford would have been considered hazardous to the workplace — an IT professional with a penchant for tossing aside years of costly training for a technology du jour.

But gone are the days of retirement parties and gold-plated plaques. Rather, IT professionals like Ufford now switch jobs — and employers — faster than it takes ink to dry on a business card. In fact, Ufford says getting a taste of various positions — and technologies — has actually increased her chances of survival in today’s cutthroat, highly competitive IT labor market.

“When you’re in technology, you have to stay aware of the trends,” she says. “If you have that awareness, you can make sure that you don’t become obsolete, especially as technology changes over the years.”

Ufford isn’t alone in her nontraditional take on tenure. In a September 2015 Computerworld survey of 244 IT professionals, 46% of the respondents said that they feel more pressure to create some movement in their careers, either through a job change at their current company or by moving to a different employer. And 43% said that they believe the optimum job tenure for a technology professional — the amount of time needed to gain experience and remain attractive in the job market — is one to three years at the same company.

“The employee-employer relationship has absolutely changed,” says John Reed, senior executive director at IT staffing firm Robert Half Technology. “The days of Dad going off to work for IBM for 40 years and getting the gold watch are behind us.”

Sent from my iPadc

09/01/2016

Open vs Private, Skies vs Tunnels, Immunization from BFA is it real or still a dream to catch

Why OpenVPN by default, remains the most secure and reliable over great distances, and open public Wi-Fi hotspots?

To answer this question, hereby is the evaluation being made for the used tunneling protocols, authentication and data encryption.

Point-to-Point Tunneling Protocol

PPTP has the most limited security.

Encryption: (DES) and 3DES (Triple DES) with their 56-bit and 128bit RC4 encryption

EAP has many weaknesses

Only the PPP payload is encrypted

Can still be broken Without using a brute force attack

Layer 2 Tunneling Protocol

L2TP combined with (IPSec) making authentication stronger

L2TP/IPSec has 256-bit data encryption Slowing processes

IPSec used key Certificates to identify the computer on the other end

The PPP frame wrapped in an L2TP header and a UDP header, and again in IPsec ESP and Authentication

Keying can stand up against brute force attacks by using AES

SSTP uses HTTPS

HTTPS, which is HTTP over SSL,

HTTPS surely get through firewalls and proxies

SSTP uses 2048-bit data encryption and encapsulates the PPP frame with IP datagrams only

The processing time is very slow, making it impractical for FTP

There is no known computer with the processing speed required to crack 2048 bits

SSL is an additional layer for authentication added to encrypted channels

Highest level of key negotiation and transfer security, but a low encryption overhead

The File transfer deciphering Key is well-protected

But the encryption is vulnerable to a brute force attack

SSL Certificates guarantees identity, and the connection is secured till the transfer is complete.

SSL based SSTP provides the benefits of the highest data encryption and authentication levels without the problem of slow processing.

OpenVPN is an SSL based protocol designed to work faster while maintaining the highest security

OpenSSL encryption provides the benefits of SSL that uses 160-bit data encryption for speed and works well against brute force attack

Sent from my iPadmc

31/12/2015

See you next year 2016

Sent from my iPadmc

31/12/2015

2016: Cloud migration will free IT’ers from burden either transform or Go home R.I.P.

Freed of the burden of managing physical data centers and dealing with hardware failures, network outages and tedious chores like putting servers into racks, IT leaders at companies that have migrated to the cloud say their teams can spend more time getting new apps into users’ hands. Perhaps most important, when a company’s technology infrastructure is largely in the cloud, IT can focus on the company’s business strategy and build tools that help users carry out the mission.

Of course, a cloud migration doesn’t necessarily mean the end of IT involvement in on-site systems altogether. IT still needs ensure that cloud-based systems are secure, for example, and manage integration of hosted systems and those that have to be kept on-premises. But as the cartoon in the August issue of our digital magazine emphasizes, a move to the cloud still leaves IT teams much more flexible than they would be if they had to manage physical data centers.

Sent from my iPadmc

31/12/2015

Looking ahead to 2016: IT Generalist versus IT Specialist

It’s amazing to me how everything in life seems to come full circle.

When I started life as an IT professional (way back in the early 1990’s), the profession was about knowing how to work with everything in the environment – an IT Generalist.

I needed to know something about everything that was implemented and deployed in the company for which I worked. We were cross-trained, youthful, and energetic.

Fast forward a few years, and the IT profession took a different turn.

IT Specialists emerged. As IT became a more trusted and steadfast business partner, IT professionals could choose the products and systems they wanted to work with.

Particularly in larger organizations, there were entire teams designated to support things like SQL Server, Windows Server, Windows workstation, Exchange, SharePoint, etc.

While IT Specialists still exist today, the IT Generalist is making a strong comeback. Knowing the details about numerous products is becoming more critical.

There’s many things you can attribute to the changes in IT, but I think the biggest is probably:

The increased acceptance of the Cloud, and those that are choosing to educate themselves on a varied stack of technologies instead of one or two areas are finding much bigger employment and professional advancement successes.

💡

This doesn’t mean that IT Specialists are going the way of the Dodo bird, or that new opportunities will only be filled by IT Generalists. It just means that in the new IT economy, there’s finally room for both once again. Both are required to ensure success.

🏁

This is one of the reasons why IT/Dev Connections is structured the way it is. IT/Dev Connections offers the following 5 distinct tracks:

  • Cloud and Data Center
  • Data Platform and Business Intelligence
  • Enterprise Collaboration
  • Enterprise Management, Mobility, and Security
  • Development and DevOps

So, for those IT Specialists, you can choose and stick with your area of expertise the entire week.

But, because IT/Dev Connections is architected to seem like 5 conferences in one, you can also jump tracks and fulfill your IT Generalist needs.

As we dip into 2016 here shortly, we’ll be rolling out our conference catalog so you’ll be able to select your path – choose your own destiny. IT Specialist or IT Generalist – the choice is intimately yours.

Sent from my iPadmc

30/12/2015

10 tips to become better IT’ers in 2016

1: Improve listening skills

IT’ers can “hear between the lines,” whether it’s detecting someone’s frustration or catching a hidden wish seeking enhancement. Listening skills continue to be a developmental area for IT.

2: Don’t be arrogant

Patience and respect for others’ input can go a long way toward dispelling IT’s reputation for sometimes being arrogant and aloof.

3: Avoid using acronyms

It is a good idea to keep acronyms out of conversations. They get in the way of clear communications.

4: Kick the tires on new technologies

50% of IT work is spent on system maintenance. Don’t let this stop you. Keep exploring for test drive offers from vendors on new trends of technology.

5: Develop a strategy for reducing system maintenance

Outsource your applications to the cloud, Assess the breakage levels of applications to replace high-breakage apps.

6: Implement green IT in asset management

Reduce the number of physical servers and storage devices/cabinets by replacing them with virtual counterparts.

Use Asset Management software to track IT hardware utilization in order to identify and get rid of the ones that are barely or no longer being used saving space and power.

7: Commit to staff training and development

It is advisable to invest in key valuable techies by offering proactive technology education and career growth paths in order to keep them.

8: Employ end users in QA checkouts to help in ensuring their buy-in to the app.

9: Update your DR plan

10: Revisit your data retention policies with business units across the enterprise on an annual basis.

Sent from my iPadmc

26/12/2015

Fairphone modular smartphone

January 1, 2016 — Dutch-based Fairphone aims to produce a smartphone designed with minimal harm to the planet, and with a longer lifespan than most phones.

Sent from my iPadc

24/12/2015

EMC RSA security Analytics: SIEM product overview

EMC RSA Security Analytics is an enterprise security information and event management (SIEM) product. The purpose of a SIEM is to harvest, analyze and report on security log data across an enterprise, including network-based security controls and host operating systems and applications. EMC RSA Security Analytics reviews the security log entries for signs of suspicious activity, and then acts accordingly to report any signs of malicious activity to administrators.

EMC RSA Security Analytics is a highly modular product with several major components, including:

  • Capture Infrastructure
    • Decoders collect and analyze log data and generate associated metadata;
    • Concentrators collect metadata from the decoders;
    • Brokers, which provide an interface for queries to metadata on multiple concentrators; and
    • Analytics servers work in conjunction with a broker to provide a graphical user interface for human users.
  • Analysis and Retention Architecture
    • Archivers enable archival of old log data and metadata;
    • Event stream analyzers correlate events across the log data and metadata; and
    • Analytics warehouses provide a big data analysis capability for large sets of data and metadata.

These are available as separate products, and EMC also makes certain combinations of these products available in dedicated appliances. For example, there is an EMC RSA Security Analytics All-In-One appliance that combines a decoder, a concentrator and an analytics server. Another option is an EMC RSA Security Analytics Hybrid, which is similar, but only offers decoder and concentrator functions; a separate analytics server is still needed.

More information on each of the components described above is available here.

Sent from my iPadc

24/12/2015

Google pushes new scheme for native-like Web apps

Web apps are dead. Long live Web apps.

Dissatisfied with the quality of Web apps compared to their native cousins, Google is pursuing its Progressive Web Apps concept, which looks to combine the best of the Web and the best of apps. Intended for any form factor, Progressive apps load quickly even on questionable network connections, send push notifications, and have an icon on the home screen.

“The way that we think of Progressive Web Apps is they use modern Web capabilities, they deliver an app-like user experience,” said Alex Komoroske, Google group product manager for the Chrome platform, in an interview. “Also they evolve from just pages and browser tabs on mobile into top-level apps, all with the low friction of the Web.

Progressive Web Apps, he said, are “a consciousness raiser, helping developers see that they can do more than they sort of thought they could do with the Web.”

Several technologies are key to Progressive Web Apps. One is an application shell architecture, in which HTML, CSS, and JavaScript load fast, are cached, and enable dynamic content to populate a view. “Think of your app’s shell like the bundle of code you’d publish to an app store if building a native app — it’s the load needed to get off the ground, but might not be the whole story. Keep your UI local and pull in content dynamically through an API,” according to the Google Developers Web page.

Then there’s Service Workers, in which a script runs in the background in the browser, separate from the Web page, responding to events like network requests. A Google Chromium project, Service Workers supports offline experiences and enables development of experiences that load quickly upon returning to them.

App Install Banners enables a Web app to be easily added to a home screen without leaving the browser. Push and Notifications, meanwhile, features events in which the server supplies a message to the Service Worker, which then sends the information to the user. (The W3C manages the Push and Notification APIs.) Apps are served via HTTPS to prevent tampering with content.

In a blog post earlier this year, Alex Russell, a Web developer working on Chrome, Blink, and the Web Platform at Google, explained that with Progressive Web Apps, the site starts out as a regular tab but is built with such capabilities as Transport Layer Security (TLS) and Responsive Design. “When launched from the home screen, these apps blend into the environment; they’re top-level, full-screen, and work offline.

He adds, “When users engage with Progressive Apps enough, browsers offer prompts that ask users if they want to keep them. To avoid spaminess, this doesn’t happen on the first load,” Russell said. Building immersive apps using Web technology “no longer requires giving up the Web itself,” he said. “Progressive Apps are our ticket out of the tab, if only we reach for it.”

Google does not see Progressive Web Apps as strictly the domain of its Chrome browser; Mozilla also has participated, Komoroske said. “Actually, we’ve been co-developing these with Mozilla since the very beginning.” While Google sees use of Progressive Web Apps concepts like Service Workers being in an early stage, growth is happening, said Komoroske. For example, Google sees 350 million push notifications a day and 2.2 billion page loads a day using Service Workers.

Sent from my iPadc

Follow

Get every new post delivered to your Inbox.

Join 285 other followers